您要查找的是不是:
- The key can be used for key encryption. 密钥可用于密钥加密。
- Demonstrates how you can use public key encryption to exchange messages. 演示如何使用公钥加密来交换消息。
- Provides an introductory example of how to use public key encryption. 提供了有关如何使用公钥加密的介绍性示例。
- For instance, the idea of Public Key Encryption which was patented in the US. 一个很好的例子是在美国获得专利的公钥加密。
- Signing an assembly with a strong name adds a public key encryption to the file containing the assembly manifest. 使用强名称对程序集进行签名将向包含程序集清单的文件添加公钥加密。
- This sample demonstrates how you can use public key encryption to exchange messages. 本示例说明了如何使用公钥加密来交换消息。
- Once a secret key encrypt system in VC++6.0 environment is designed and realized. 文中在VC++6.;0环境下设计并实现了一次一密文件加密系统。
- The algorithm selection shows RSA suits public key encryption and AES is good for voice encryption. 经过算法筛选确定了采用RSA 作为公共密钥管理和采用AES 承载业务加密的技术路线。
- Based on the technology of SSL and public key encryption, the paper producesa common model-SWM for secure website . 本文在SSL、公用密码技术的基础上,提出了安全Web网站的通用模型SWM。
- A key refurbish based on private key encryption is presented for mobile communication system. 摘要通过密钥刷新,设计了一个适于移动通信系统的基于私钥的认证和密钥交换方案。
- At the same time it discusses public key encryption system, digital signature, Fair Non Repudiation Protocol, Certified Electronic Mail Protocol etc. 同时讨论了公开密钥加密体制、单项散列函数、数字签名、FNP、CMP等技术
- Like urban public transport as IC cards, these cards to the public transport system, each card key encryption to have control of the factory. 就象城市公共交通IC卡一样,这些卡在交给公交系统使用前,每张卡的密钥都要进行出厂加密控制。
- Most corporations do not need the level of e-mail security provided by PGP or built-in public key encryption in most e-mail systems. 大多数企业的大多数电子邮件系统不需要PGP或内置公匙加密提供的电子邮件安全级别。
- The traditional encryption system is introduced. A new reconfigurable key encryption system is proposed. The features of this new system are analyzed. 摘要在介绍传统保密系统的基础上,提出了基于密钥重构保密系统的设计思想。分析了这种系统的特点。
- RSA is a symmetric cipher system and a public key encryption algorithm system. Both RSA and DSA use public key algorithms for data encryption. 问题是藏十先东暖命席业,义尔此寇RSA使用的难道不是非对称算法吗?为什么说RSA是对称加密系统?是我理解错了还是书印错了?
- This paper introduces in a systematic way symmetry encryption, public key encryption and composite encryption as well as end to end encryption and data encryption on network. 本文系统地讨论了对称式加密、公开密钥加密以及混合式加密三种数据加密技术以及链路加密和端对端加密两种网络数据加密方式。
- Baseline Privacy plus Interface(BPI+)on DOCSIS uses the56bit DES for Packet Data Encryp-tion,and the Three-ary DES for the Traffic Encryption Key Encryption. 基于DOCSIS标准的增强型基线保密性接口(BPI+)采用56bitDES加密分组数据、采用二密钥三重DES加密通信量加密密钥。
- Public key encryption is a technique that uses a pair of asymmetric keys for encryption and decryption. 公钥加密是使用一对非对称的密钥加密或解密的技术。
- In a real world scenario, Alice and Bob use public key (asymmetric) encryption to transfer a secret (symmetric) key and use secret key encryption for the remainder of their session. 在一个实际方案中,小红和小明使用公钥(不对称)加密来传输私(对称)钥,而对他们的会话的其余部分使用私钥加密。
- The authors make an introduction to the safety techniques used normally on web service: synchronous private key encryption and asymmetrical private key encryption, and discuss the safety mechanism of SSL protocol and its application on web. 介绍了Web服务常用的安全技术:对称密钥加密系统和非对称密钥加密系统。 论述了SSL安全协议的安全机制和它在Web上的应用。